Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
_____ has created decency concerns,because these e-mails often contain explicit language or nudity.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
D
What are some of the causes of health issues related to information technology?
Free
(Essay)
4.9/5
(42)
Correct Answer:
Work habits can cause some physical problems and so can the work environment in which computers are used-static electricity,inadequate ventilation,poor lighting,dry air,unsuitable furniture,and too few rest breaks.The increasing popularity of touchscreens on smartphones,tablets,and some PCs may result in more stress-related injuries of the users' hands,arms,back,and eyes.
A patent protects product names and identifying marks.
Free
(True/False)
4.9/5
(40)
Correct Answer:
False
What is being done to lessen consumers' reluctance to make online shopping purchases?
(Essay)
4.7/5
(31)
A _________ is an intellectual property that protects product names and identifying marks.
(Multiple Choice)
4.9/5
(34)
Which of the following is a potential drawback of telecommuting?
(Multiple Choice)
4.9/5
(36)
In the context of information technology in workplaces,which of the following allows adding new tasks to employees' responsibilities?
(Multiple Choice)
4.9/5
(41)
_____ is registering,selling,or using a domain name to profit from someone else's trademark.
(Multiple Choice)
4.9/5
(37)
In the context of information technology in workplaces,which of the following is an advantage of virtual organizations?
(Multiple Choice)
4.8/5
(42)
In the context of Web and network privacy,an acceptable use policy is _____.
(Multiple Choice)
5.0/5
(35)
Which of the following is a benefit of using patents in organizations?
(Multiple Choice)
4.7/5
(40)
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
(True/False)
4.9/5
(30)
_________ organizations are networks of independent companies,suppliers,customers,and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
(Multiple Choice)
4.9/5
(35)
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _________.
(Multiple Choice)
4.8/5
(33)
_________ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user's hard drive.
(Multiple Choice)
5.0/5
(39)
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.
(Multiple Choice)
4.8/5
(42)
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.
(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)